Author of the publication

Cloak and dagger: dynamics of web search cloaking.

, , and . ACM Conference on Computer and Communications Security, page 477-490. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AFRAID - A Frequently Redundant Array of Independent Disks., and . USENIX Annual Technical Conference, page 27-39. USENIX Association, (1996)Difference engine: harnessing memory redundancy in virtual machines., , , , , , , and . Commun. ACM, 53 (10): 85-93 (2010)Scalability, fidelity, and containment in the potemkin virtual honeyfarm., , , , , , , and . SOSP, page 148-162. ACM, (2005)Judging a site by its content: learning the textual, structural, and visual features of malicious web pages., , and . AISec, page 1-10. ACM, (2011)No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps., , , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 207-224 (January 2023)Detecting and Isolating Malicious Routers., , , and . IEEE Trans. Dependable Secur. Comput., 3 (3): 230-244 (2006)Measuring Security Practices and How They Impact Security., , , , , , , , and . Internet Measurement Conference, page 36-49. ACM, (2019)Following Their Footsteps: Characterizing Account Automation Abuse and Defenses., , , , and . Internet Measurement Conference, page 43-55. ACM, (2018)Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , and . WEIS, (2015)Web feature deprecation: a case study for chrome., , , , , and . ICSE (SEIP), page 302-311. IEEE / ACM, (2019)